There are multiple sql injection vulnerabilities in this product. The exploit uses the sql injection vulnerability on the last step of the password recovery process and forces the application to reset the password and show the username, without requiring authentication or executing the first step. The vulnerability allows the recovery of both admin and operator.
This exploit allows an attacker to include remote files in the vulnerable application, which can lead to remote code execution.
ToLower() filter being applied to supplied arguments e.g. 'A' x41 beomes 'a' x61 etc... may be possible to subvert using encoder technique like 'ALPHA3'. Also we need to supply a second argument of just 4 bytes to trigger the access violation.
This exploit allows an authenticated user to overwrite wp_options in WordPress Social Stream plugin. It requires access to the wp-login.php file.
An invalid read vulnerability has been identified in Foxit PDF Reader (version 1.0.1.0925 for Linux 64-bit). It can be triggered by opening a specially crafted PDF file. The vulnerability leads to a segmentation fault, resulting in a crash.
The vulnerability occurs in Foxit PDF Reader version 1.0.1.0925 for Linux 64-bit when a specially crafted PDF file is opened. The crash is triggered by an out-of-bounds read in the CPDF_DIBSource::TranslateScanline24bpp function. This can be exploited by an attacker to execute arbitrary code or cause a denial of service.
A memory corruption vulnerability has been identified in Foxit PDF Reader. This vulnerability can be exploited by opening a specially crafted PDF file. The issue occurs when the application is started with specific environment variables. An excerpt from the crash log suggests that the issue is related to a free() function call with an invalid pointer.
The vulnerability allows an attacker to include a remote file on the victim's server, potentially leading to remote code execution.
The vulnerability is present in the isql_main.c file of iSQL(RL) 1.0. The strcpy function at line 453 is vulnerable as it does not check the size of the 'str' variable before copying it into 'cmd'. This can lead to a buffer overflow.
The exploit allows an attacker to execute arbitrary code on a target system by creating a malicious .m3u file. This can be used to take control of the affected system and potentially gain unauthorized access. The exploit takes advantage of a buffer overflow vulnerability in the Easy RM to MP3 Converter software.